<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>ddos Archives - Linux Windows and android Tutorials</title>
	<atom:link href="https://www.osradar.com/tag/ddos/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.osradar.com</link>
	<description>tutorials and news and Seurity</description>
	<lastBuildDate>Thu, 28 Jun 2018 07:05:29 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=5.8.12</generator>
	<item>
		<title>UPnP DDoS Attacks are becoming a Reality</title>
		<link>https://www.osradar.com/upnp-ddos-attacks-are-becoming-a-reality/</link>
					<comments>https://www.osradar.com/upnp-ddos-attacks-are-becoming-a-reality/#respond</comments>
		
		<dc:creator><![CDATA[osradar_editor]]></dc:creator>
		<pubDate>Thu, 28 Jun 2018 07:05:29 +0000</pubDate>
				<category><![CDATA[Featured]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[ddos]]></category>
		<category><![CDATA[ddos attack]]></category>
		<category><![CDATA[dos]]></category>
		<category><![CDATA[upnp ddos]]></category>
		<category><![CDATA[upnp dos]]></category>
		<guid isPermaLink="false">https://www.osradar.com/?p=4486</guid>

					<description><![CDATA[<p>DDoS attacks are one of the most popular types of attacks that can bring down a website or a server and put it into inaccessible state for minutes to hours. Although no DDoS attack is able to steal any information, they’re really annoying and from business point of view, it’s a huge loss for a [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://www.osradar.com/upnp-ddos-attacks-are-becoming-a-reality/">UPnP DDoS Attacks are becoming a Reality</a> appeared first on <a rel="nofollow" href="https://www.osradar.com">Linux  Windows and android  Tutorials</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>DDoS attacks are one of the most popular types of attacks that can bring down a website or a server and put it into inaccessible state for minutes to hours. Although no DDoS attack is able to steal any information, they’re really annoying and from business point of view, it’s a huge loss for a company as every single second is valuable.</p>
<p>There are a number of services and methods to mitigate the classic DDoS attacks. Despite we saw a spike in the size and number of DDoS attacks in the recent past (where <a href="https://www.osradar.com/mitigate-ddos-memcached-servers/">“memcached” servers were used to launch terabit DDoS attacks</a>), everything was pretty much under control, until now.</p>
<h2>New DDoS method</h2>
<p><img loading="lazy" class=" wp-image-4487 aligncenter" src="https://www.osradar.com/wp-content/uploads/2018/06/UPnP-new-DDoS-method.gif" alt="" width="519" height="187" /></p>
<p>Recently, a new technique for DDoS is discovered – the UPnP port masking. This method was first detailed last month by security researchers from Imperva. According to their reports, DDoS botnets are recently starting to use the UPnP protocol found on home routers for bouncing DDoS traffic off the router, but alter the source port of the traffic to a random number.</p>
<p>This method successfully evades the previous DDoS mitigation system. Older mitigation system relies on reading the information and because of the new technique, it’s not working anymore. Thus, DDoS botnets are able to successfully hit the target.</p>
<p>However, there’s a way to prevent such an incident by implementing newer DDoS mitigation system that rely on DPI (Deep Packet Inspection). Using this technique, the UPnP DDoS attacks are not able to hit the target. Unfortunately, the price and performance of the better DDoS protection system isn’t so friendly. The method works slower and really costly for users.</p>
<h2>UPnP port masking spreads from DNS, NTP to SSDP</h2>
<p>Back in May, Imperva researchers reported that they identified botnets that were executing DDoS attacks from NTP and DNS protocols, but disguised the traffic as coming from random ports instead of expected ports (port 53 for DNS and port 123 for NTP).</p>
<p>Recently, a report from Arbor Network confirmed seeing a similar DDoS attack that leveraged the UPnP protocol. However, this time, the method masked the SSDP-based DDoS data packets. It would be easy to defend against SSDP DDoS as identifying data coming from port 1900. As it was behind UPnP, it’s not easily detectable any more.</p>
<p>It’s clearly obvious that we’re going to see more of this attack in the near future as the technique starts to popularize itself among botnet groups. Security companies have to investigate and find out ways to prevent this type of DDoS attack and save the industry.</p>
<p>The post <a rel="nofollow" href="https://www.osradar.com/upnp-ddos-attacks-are-becoming-a-reality/">UPnP DDoS Attacks are becoming a Reality</a> appeared first on <a rel="nofollow" href="https://www.osradar.com">Linux  Windows and android  Tutorials</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.osradar.com/upnp-ddos-attacks-are-becoming-a-reality/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>How to Mitigate DDoS from Memcached Servers</title>
		<link>https://www.osradar.com/mitigate-ddos-memcached-servers/</link>
					<comments>https://www.osradar.com/mitigate-ddos-memcached-servers/#respond</comments>
		
		<dc:creator><![CDATA[Mel]]></dc:creator>
		<pubDate>Sat, 10 Mar 2018 08:37:00 +0000</pubDate>
				<category><![CDATA[Featured]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[ddos]]></category>
		<category><![CDATA[memcached]]></category>
		<guid isPermaLink="false">https://www.osradar.com/?p=2118</guid>

					<description><![CDATA[<p>Recently, the frequency of DDoS has reached sky-high. Thanks to the availability of Memcached servers, attackers were able to launch DDoS of ~1 terabit/s! This is HUGE and a quite big deal. Only those who are the victim can understand the situation. DDoS is generally not capable of penetrating into systems, but it can shut [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://www.osradar.com/mitigate-ddos-memcached-servers/">How to Mitigate DDoS from Memcached Servers</a> appeared first on <a rel="nofollow" href="https://www.osradar.com">Linux  Windows and android  Tutorials</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Recently, the frequency of DDoS has reached sky-high. Thanks to the availability of Memcached servers, attackers were able to launch DDoS of ~1 terabit/s! This is HUGE and a quite big deal. Only those who are the victim can understand the situation. DDoS is generally not capable of penetrating into systems, but it can shut down a system or website for quite a long time. In business, this is a big problem. However, security researchers recently discovered tricks that can mitigate the DDoS attack damage.</p>
<p>The Memcached servers are the biggest benefit on hackers’ end. These servers can dramatically increase the load of DDoS, which is why we’re seeing terabit DDoS. Memcached servers allow super-fast access to loads of data to apps from other external databases into the cache memory. Apps can read and use data faster from there, speeding up the performance. It’s heavily used in business models for providing more cutting-edge performance. However, the same thing hackers are using to lauch the terabit attacks.</p>
<h3>Why use DDoS</h3>
<p>DDoS (Distributed Denial of Service) is one of the oldest-fashioned yet effective method of making an online service unavailable to others. This is a not DIRECT hack. Instead, it disables the feature for quite a time.</p>
<p>DDoS was a serious threat in the previous generation of internet. Nowadays, the tricks to trigger a DDoS attack and other requirements are quite easy to acquire. In many cases, newbie hackers try to have some fun with it. So, why it’s widely used today? It’s mainly important to note the industrial usage. For example, if Google was down for about 5 minutes, that would mean serious issue to the business. This attack can also be to redirect focus from an event to another, often to anonymize the real hacking.</p>
<h3>The mitigation</h3>
<p>This technique is quite interesting. One of the developers of Memcached servers, Dormando, proposed the workaround. According to his tweet,</p>
<blockquote class="twitter-tweet">
<p dir="ltr" lang="en">For what it&#8217;s worth, if you&#8217;re getting attacked by memcached&#8217;s, it&#8217;s pretty easy to disable them since the source won&#8217;t be spoofed. They may accept &#8220;shutdown\r\n&#8221;, but also running &#8220;flush_all\r\n&#8221; in a loop will prevent amplification.</p>
<p>— dormando (@dormando) <a href="https://twitter.com/dormando/status/968579781729009664?ref_src=twsrc%5Etfw">February 27, 2018</a></p></blockquote>
<p>Unfortunately, the proposal didn’t get much attention in the first place. Corero, a network protection service, recently reported that they integrated the trick into their system and found “100% effective” in any live DDoS attack. The Corero experts also said that they didn’t notice any type of collateral damage of this technique.</p>
<h3>Update “Memcached” servers</h3>
<p>The main reason why Memcached servers are widely used in the recent attacks is that Memcached servers are widely used and left accessible online. The servers available for public access on port 11211. This enabled the present occurrences.</p>
<p>Now, an update of Memcached server software is available. The latest version (currently) is v1.5.6. The Memcached team patched the system from the vulnerability. This version disables UDP protocol (by default). The user has to manually turn it on while deploying the server. If you’re an owner of Memcached server, <a href="https://memcached.org/">get the latest Memcached</a>.</p>
<h3>Number of open “Memcached” decreased</h3>
<p>After the occurrence of the major DDoS attacks, security researchers and cloud service providers started taking necessary steps to protect the web from the disaster.</p>
<blockquote class="twitter-tweet">
<p dir="ltr" lang="en">Although there were 107,431 Memcached servers in Shodan this morning. The population Memcached is slowly but steadily shrinking. Servers which where vulnerable this morning are now closed 8 hours later. We still have a long way to go but progress is being made. ? <a href="https://t.co/nqAFt4BAmG">pic.twitter.com/nqAFt4BAmG</a></p>
<p>— Victor Gevers (@0xDUDE) <a href="https://twitter.com/0xDUDE/status/971515743589322752?ref_src=twsrc%5Etfw">March 7, 2018</a></p></blockquote>
<p>According to this tweet, the number dropped down a lot.</p>
<p>Moreover, system admins also took actions to protect their servers from such misuse.</p>
<blockquote class="twitter-tweet">
<p dir="ltr" lang="en">Last week there were 93,000 Memcached servers left exposed online. This week we have 105,000.</p>
<p>What are you doing people?!?!?!? You&#8217;re supposed to put them behind a firewall, not in front of it. ?? <a href="https://t.co/YUGsFvER4n">pic.twitter.com/YUGsFvER4n</a></p>
<p>— Catalin Cimpanu (@campuscodi) <a href="https://twitter.com/campuscodi/status/970790814111748096?ref_src=twsrc%5Etfw">March 5, 2018</a></p></blockquote>
<h3>More Memcached flaw(s)</h3>
<p>Memcached isn’t fixed yet. <a href="https://www.corero.com/blog/?id=877">According to Corero</a>, the vulnerability was more dangerous than expected as it could also allow the hacker to modify/steal information from the servers. However, Corero didn’t provide any detailed info on the flaw. They reached out to national security agencies so that they can prepare and send out the proper security alerts.</p>
<p>Check out if it&#8217;s <a href="https://www.osradar.com/possible-avoid-dos-attacks/">possible to avoid DDoS</a>.</p>
<p>The post <a rel="nofollow" href="https://www.osradar.com/mitigate-ddos-memcached-servers/">How to Mitigate DDoS from Memcached Servers</a> appeared first on <a rel="nofollow" href="https://www.osradar.com">Linux  Windows and android  Tutorials</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.osradar.com/mitigate-ddos-memcached-servers/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
